ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,298 papers shown
Title
Deterministic Certification to Adversarial Attacks via Bernstein
  Polynomial Approximation
Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Ching-Chia Kao
Jhe-Bang Ko
Chun-Shien Lu
AAML
55
1
0
28 Nov 2020
Incorporating Hidden Layer representation into Adversarial Attacks and
  Defences
Incorporating Hidden Layer representation into Adversarial Attacks and Defences
Haojing Shen
Sihong Chen
Ran Wang
Xizhao Wang
AAML
61
0
0
28 Nov 2020
Voting based ensemble improves robustness of defensive models
Voting based ensemble improves robustness of defensive models
Devvrit
Minhao Cheng
Cho-Jui Hsieh
Inderjit Dhillon
OODFedMLAAML
66
12
0
28 Nov 2020
A Study on the Uncertainty of Convolutional Layers in Deep Neural
  Networks
A Study on the Uncertainty of Convolutional Layers in Deep Neural Networks
Hao Shen
Sihong Chen
Ran Wang
70
5
0
27 Nov 2020
3D Invisible Cloak
3D Invisible Cloak
Mingfu Xue
Can He
Zhiyu Wu
Jian Wang
Zhe Liu
Weiqiang Liu
59
1
0
27 Nov 2020
ShapeFlow: Dynamic Shape Interpreter for TensorFlow
ShapeFlow: Dynamic Shape Interpreter for TensorFlow
Sahil Verma
Z. Su
22
11
0
26 Nov 2020
Invisible Perturbations: Physical Adversarial Examples Exploiting the
  Rolling Shutter Effect
Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Athena Sayles
Ashish Hooda
M. Gupta
Rahul Chatterjee
Earlence Fernandes
AAML
87
78
0
26 Nov 2020
Probing Model Signal-Awareness via Prediction-Preserving Input
  Minimization
Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Sahil Suneja
Yunhui Zheng
Yufan Zhuang
Jim Laredo
Alessandro Morari
AAML
71
34
0
25 Nov 2020
Adversarial Attack on Facial Recognition using Visible Light
Adversarial Attack on Facial Recognition using Visible Light
Morgan Frearson
Kien Nguyen
AAML
41
7
0
25 Nov 2020
Stochastic sparse adversarial attacks
Stochastic sparse adversarial attacks
M. Césaire
Théo Combey
H. Hajri
Sylvain Lamprier
Patrick Gallinari
AAML
61
9
0
24 Nov 2020
Towards Imperceptible Universal Attacks on Texture Recognition
Towards Imperceptible Universal Attacks on Texture Recognition
Yingpeng Deng
Lina Karam
AAML
41
1
0
24 Nov 2020
Augmented Lagrangian Adversarial Attacks
Augmented Lagrangian Adversarial Attacks
Jérôme Rony
Eric Granger
M. Pedersoli
Ismail Ben Ayed
AAML
82
39
0
24 Nov 2020
When Machine Learning Meets Privacy: A Survey and Outlook
When Machine Learning Meets Privacy: A Survey and Outlook
B. Liu
Ming Ding
Sina shaham
W. Rahayu
F. Farokhi
Zihuai Lin
97
293
0
24 Nov 2020
Omni: Automated Ensemble with Unexpected Models against Adversarial
  Evasion Attack
Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack
Rui Shu
Tianpei Xia
Laurie A. Williams
Tim Menzies
AAML
70
16
0
23 Nov 2020
Learnable Boundary Guided Adversarial Training
Learnable Boundary Guided Adversarial Training
Jiequan Cui
Shu Liu
Liwei Wang
Jiaya Jia
OODAAML
113
132
0
23 Nov 2020
Better Aggregation in Test-Time Augmentation
Better Aggregation in Test-Time Augmentation
Divya Shanmugam
Davis W. Blalock
Guha Balakrishnan
John Guttag
ViT
100
148
0
23 Nov 2020
Multi-Task Adversarial Attack
Multi-Task Adversarial Attack
Pengxin Guo
Yuancheng Xu
Baijiong Lin
Yu Zhang
AAML
50
8
0
19 Nov 2020
Adversarial collision attacks on image hashing functions
Adversarial collision attacks on image hashing functions
Brian Dolhansky
Cristian Canton Ferrer
AAML
118
21
0
18 Nov 2020
Adversarial Turing Patterns from Cellular Automata
Adversarial Turing Patterns from Cellular Automata
Nurislam Tursynbek
I. Vilkoviskiy
Maria Sindeeva
Ivan Oseledets
AAML
47
4
0
18 Nov 2020
Self-Gradient Networks
Self-Gradient Networks
Hossein Aboutalebi
M. Shafiee
AAML
27
0
0
18 Nov 2020
Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples
  in Pre-trained CNNs
Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples in Pre-trained CNNs
Arezoo Rajabi
R. Bobba
OODDAAML
21
2
0
18 Nov 2020
Statistical model-based evaluation of neural networks
Statistical model-based evaluation of neural networks
Sandipan Das
P. B. Gohain
Alireza M. Javid
Yonina C. Eldar
Saikat Chatterjee
23
0
0
18 Nov 2020
Extreme Value Preserving Networks
Extreme Value Preserving Networks
Mingjie Sun
Jianguo Li
Changshui Zhang
AAMLMDE
26
0
0
17 Nov 2020
Learning Models for Actionable Recourse
Learning Models for Actionable Recourse
Alexis Ross
Himabindu Lakkaraju
Osbert Bastani
FaML
106
19
0
12 Nov 2020
Detecting Adversarial Patches with Class Conditional Reconstruction
  Networks
Detecting Adversarial Patches with Class Conditional Reconstruction Networks
Perry Deng
Mohammad Saidur Rahman
M. Wright
AAML
65
2
0
11 Nov 2020
Efficient and Transferable Adversarial Examples from Bayesian Neural
  Networks
Efficient and Transferable Adversarial Examples from Bayesian Neural Networks
Martin Gubri
Maxime Cordy
Mike Papadakis
Yves Le Traon
Koushik Sen
AAML
151
11
0
10 Nov 2020
Risk Assessment for Machine Learning Models
Risk Assessment for Machine Learning Models
Paul Schwerdtner
Florens Greßner
Nikhil Kapoor
F. Assion
René Sass
W. Günther
Fabian Hüger
Peter Schlicht
38
6
0
09 Nov 2020
Bridging the Performance Gap between FGSM and PGD Adversarial Training
Bridging the Performance Gap between FGSM and PGD Adversarial Training
Tianjin Huang
Vlado Menkovski
Yulong Pei
Mykola Pechenizkiy
AAML
46
20
0
07 Nov 2020
A survey on practical adversarial examples for malware classifiers
A survey on practical adversarial examples for malware classifiers
Daniel Park
B. Yener
AAML
96
16
0
06 Nov 2020
Adversarial Examples in Constrained Domains
Adversarial Examples in Constrained Domains
Ryan Sheatsley
Nicolas Papernot
Mike Weisman
Gunjan Verma
Patrick McDaniel
AAML
69
24
0
02 Nov 2020
The Vulnerability of the Neural Networks Against Adversarial Examples in
  Deep Learning Algorithms
The Vulnerability of the Neural Networks Against Adversarial Examples in Deep Learning Algorithms
Rui Zhao
AAML
60
1
0
02 Nov 2020
EEG-Based Brain-Computer Interfaces Are Vulnerable to Backdoor Attacks
EEG-Based Brain-Computer Interfaces Are Vulnerable to Backdoor Attacks
Lubin Meng
Jian Huang
Zhigang Zeng
Xue Jiang
Shan Yu
T. Jung
Chin-Teng Lin
Ricardo Chavarriaga
Dongrui Wu
AAML
83
35
0
30 Oct 2020
Can the state of relevant neurons in a deep neural networks serve as
  indicators for detecting adversarial attacks?
Can the state of relevant neurons in a deep neural networks serve as indicators for detecting adversarial attacks?
Roger Granda
Tinne Tuytelaars
José Oramas
AAML
13
1
0
29 Oct 2020
Perception Matters: Exploring Imperceptible and Transferable
  Anti-forensics for GAN-generated Fake Face Imagery Detection
Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection
Yongwei Wang
Xin Ding
Li Ding
Rabab Ward
Z. J. Wang
AAML
41
21
0
29 Oct 2020
WaveTransform: Crafting Adversarial Examples via Input Decomposition
WaveTransform: Crafting Adversarial Examples via Input Decomposition
Divyam Anshumaan
Akshay Agarwal
Mayank Vatsa
Richa Singh
AAML
52
11
0
29 Oct 2020
Beyond cross-entropy: learning highly separable feature distributions
  for robust and accurate classification
Beyond cross-entropy: learning highly separable feature distributions for robust and accurate classification
Arslan Ali
A. Migliorati
T. Bianchi
E. Magli
AAMLOODOODD
29
1
0
29 Oct 2020
Transferable Universal Adversarial Perturbations Using Generative Models
Transferable Universal Adversarial Perturbations Using Generative Models
Atiyeh Hashemi
Andreas Bär
S. Mozaffari
Tim Fingscheidt
AAML
78
17
0
28 Oct 2020
Fast Local Attack: Generating Local Adversarial Examples for Object
  Detectors
Fast Local Attack: Generating Local Adversarial Examples for Object Detectors
Quanyu Liao
Xin Wang
Bin Kong
Siwei Lyu
Youbing Yin
Qi Song
Xi Wu
ObjDAAML
80
4
0
27 Oct 2020
Robust Pre-Training by Adversarial Contrastive Learning
Robust Pre-Training by Adversarial Contrastive Learning
Ziyu Jiang
Tianlong Chen
Ting-Li Chen
Zhangyang Wang
108
234
0
26 Oct 2020
Asymptotic Behavior of Adversarial Training in Binary Classification
Asymptotic Behavior of Adversarial Training in Binary Classification
Hossein Taheri
Ramtin Pedarsani
Christos Thrampoulidis
AAML
88
16
0
26 Oct 2020
Attack Agnostic Adversarial Defense via Visual Imperceptible Bound
Attack Agnostic Adversarial Defense via Visual Imperceptible Bound
S. Chhabra
Akshay Agarwal
Richa Singh
Mayank Vatsa
AAML
64
3
0
25 Oct 2020
Dynamic Adversarial Patch for Evading Object Detection Models
Dynamic Adversarial Patch for Evading Object Detection Models
Shahar Hoory
T. Shapira
A. Shabtai
Yuval Elovici
AAML
80
41
0
25 Oct 2020
Towards Robust Neural Networks via Orthogonal Diversity
Towards Robust Neural Networks via Orthogonal Diversity
Kun Fang
Qinghua Tao
Yingwen Wu
Tao Li
Jia Cai
Feipeng Cai
Xiaolin Huang
Jie Yang
AAML
92
8
0
23 Oct 2020
Contrastive Learning with Adversarial Examples
Contrastive Learning with Adversarial Examples
Chih-Hui Ho
Nuno Vasconcelos
SSL
92
142
0
22 Oct 2020
Adversarial Attacks on Binary Image Recognition Systems
Adversarial Attacks on Binary Image Recognition Systems
Eric Balkanski
Harrison W. Chase
Kojin Oshiba
Alexander Rilee
Yaron Singer
Richard Wang
AAML
76
4
0
22 Oct 2020
Boosting Gradient for White-Box Adversarial Attacks
Boosting Gradient for White-Box Adversarial Attacks
Hongying Liu
Zhenyu Zhou
Fanhua Shang
Xiaoyu Qi
Yuanyuan Liu
L. Jiao
AAML
49
8
0
21 Oct 2020
Ulixes: Facial Recognition Privacy with Adversarial Machine Learning
Ulixes: Facial Recognition Privacy with Adversarial Machine Learning
Thomas Cilloni
Wei Wang
Charles Walter
Charles Fleming
PICVAAML
37
8
0
20 Oct 2020
L-RED: Efficient Post-Training Detection of Imperceptible Backdoor
  Attacks without Access to the Training Set
L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set
Zhen Xiang
David J. Miller
G. Kesidis
AAML
141
15
0
20 Oct 2020
A Survey of Machine Learning Techniques in Adversarial Image Forensics
A Survey of Machine Learning Techniques in Adversarial Image Forensics
Ehsan Nowroozi
Ali Dehghantanha
R. Parizi
K. Choo
AAML
69
73
0
19 Oct 2020
Optimism in the Face of Adversity: Understanding and Improving Deep
  Learning through Adversarial Robustness
Optimism in the Face of Adversity: Understanding and Improving Deep Learning through Adversarial Robustness
Guillermo Ortiz-Jiménez
Apostolos Modas
Seyed-Mohsen Moosavi-Dezfooli
P. Frossard
AAML
121
48
0
19 Oct 2020
Previous
123...242526...444546
Next